Dr Jims Ningshen Marchang

  1. About us
  2. Our people
  3. Staff profiles
  4. Dr Jims Ningshen Marchang

Dr Jims Ningshen Marchang Ph.D.

Sr. Lecturer and Research Co-Lead of Technological and Digital Innovations to Promote Independent Lives in AWRC


Summary

Dr. Jims Marchang completed his Ph.D. from the CSCAN Research Laboratory, University of Plymouth, UK. He is currently a Sr. Lecturer in Cybersecurity in the department of Computing at SHU and as research Co-Lead of Technological and Digital Innovations to Promote Independent Lives at the Advanced Wellbeing Research Centre.

He leads an Intelligent and Secure Cybersecurity research group known as iSec CyberNet. His research focuses on building privacy preserving systems, developing transparent and trusted secure systems to support resource constraint networks and devices like IoT, IoMT and Sensors. The research also includes securing and safeguarding privacy of autonomous systems (multimodal care robotic systems) and Blockchain Technologies.

About

Dr. Jims Marchang is a Sr. Lecturer in Cybersecurity at Sheffield Hallam University (SHU) and a Co-Lead of the research theme on technological and digital innovations to promote independent lives at the Advanced Wellbeing Research Centre. He is also the research cluster lead of an intelligent & secure Cyber security research group known as iSec CyberNet to address IoT application solutions. He was a course leader of BSc Cybersecurity, SHU from 2017-2020. He was an external assessor and validator of Middlesex University (2019-2020) of Networks and Security BSc course. He is an external examiner at Winchester University and University of Plymouth from 2020-2024. Awarded Inspirational Teaching Award from the College of Business, Technology & Engineering, Sheffield Hallam University in 2020. He received the best research paper award in 15th International Conference on Advance Computing and Communication, IEEE conferences, 2007. His other role also includes mentoring new teaching and research colleagues at SHU. He developed and managed a secure smart IoT testbed for research activities. He also manages a LoRAWAN external gateway for smart research activity at SHU.

He is a fellow of HEA, UK. Key participant of REF 2021 from Cybersecurity research team of SHU and a reviewer of Winchester University for REF 2021. He is also a mentor of AWRC Wellbeing Accelerator (R&D-focused programme). He extends his research collaboration with AWRC for healthcare and NCEFE for rice authentication, transparency and traceability using Blockchain technology. 

As a research Co-Lead of technological and digital innovations to promote independent Lives (of AWRC), he focuses on providing secure and a trusted privacy aware technological solution for health and wellbeing systems. His aim is to design and incorporate security features and preserves user privacy for multimodal assistive robotic autonomous systems and resource constraint medical devices and equipment to ensure safe adoption of such technology and support secure independent living. As a research scientist he has published high impact scientific research journal papers in the field of networks and security. He has many years of experience in both teaching and supervising both undergraduate and postgraduate students in the field of computer science, networks, and cybersecurity, including Ph.D. research project supervision and examination. He involves in reviewing scientific research journals, conference papers, and books. He is also an author of two books. He also has an experience of working as a guest journal editor at Environmental Research and Public Health, MDPI. Author of a book called Optimising Application Performance in Ad Hoc Networks: A Research Perspective, Lambert Academic publishing, Germany and authored a book with a BCS-CREST Penetration Testing Working Group, called Penetration Testing, A Guide for Business and IT Managers.

Specialist areas of interest

  • QoS and Security in resource constraint wireless Ad Hoc and sensor Networks
  • Privacy and Security of Autonomous Systems 
  • Smart IoT and IoMT Security  
  • Scalable and Trusted Blockchain Systems  
  • Intrusion Detection Systems 

 

Teaching

Department of Computing

College of Business, Technology and Engineering

Department of Computing
Science, Technology and Arts
Cybersecurity

Courses Taught

BSc Cybersecurity and MSc Cybersecurity (Currently),
BSc and MSc Computer Science and Networks (in the Past)

Modules Taught

Currently:
Secure Networking Technologies (Level 5 BSc Cybersecurity)
Mobile Security (Level 6 BSc Cybersecurity)
Research Methods (Level 7 MSc Cybersecurity)

 

Research

Current Research Projects

He was the PI of “Secure automated IoT locking system (2018-2019)”. funded by Sheffield Innovation Programme Projects (European Regional Development Fund).

CoI of “Automated IoT weighing scale (2017-2018)”. funded by Sheffield Innovation Programme Projects (European Regional Development Fund).

PI of “Secure IoT health monitoring system (2021-2022)”, funded by Sheffield Innovation Programme Projects (European Regional Development Fund).

PI and CoI of two Teaching Enhancement Project fund from SHU in 2018.

PI of “Research scoping for assistive multimodal robotic system (2022)”, https://research-scoping-in-security-and-privacy-amrsys.yolasite.com/,  funded by EPSRC, UK-RAS networks. 

 

Featured Research Projects

PI of “Research scoping for assistive multimodal robotic system (2022)”, https://research-scoping-in-security-and-privacy-amrsys.yolasite.com/,  funded by EPSRC, UK-RAS networks.  

Collaborators and Sponsors

His external industrial partner includes Ioetec, Fukuda, Willdoo, and IBM and external University partners include Plymouth, Nottingham, Winchester, Sheffield, Warwick, and Manchester. 

Publications

Journal articles

Popoola, O., Rodrigues, M., Marchang, J., Shenfield, A., Ikpehai, A., & Popoola, J. (2023). A critical literature review of security and privacy in smart home healthcare schemes adopting IoT & blockchain: problems, challenges and solutions. Blockchain: Research and Applications. http://doi.org/10.1016/j.bcra.2023.100178

Zoughalian, K., Marchang, J., & Ghita, B. (2022). A blockchain secured pharmaceutical distribution system to fight counterfeiting. International Journal of Environmental Research and Public Health, 19 (7). http://doi.org/10.3390/ijerph19074091

Marchang, J., & Nuovo, A.D. (2022). Assistive multimodal robotic system (AMRSys): security and privacy issues, challenges, and possible solutions. Applied Sciences, 12 (4). http://doi.org/10.3390/app12042174

Otebolaku, A., Enamamu, T., Alfoudi, A., Ikpehai, A., Marchang, J., & Lee, G.M. (2020). Deep Sensing: Inertial and Ambient Sensing for Activity Context Recognition Using Deep Convolutional Neural Networks. Sensors, 20 (13), 3803. http://doi.org/10.3390/s20133803

Otebolaku, A., Enamamu, T., Alfouldi, A., Ikpehai, A., & Marchang, J. (2020). Deep Sensing: Inertia and Ambient Sensing for Activity Context Recognition Using Deep Convolutional Neural Networks. . http://doi.org/10.20944/preprints202005.0430.v1

Enamamu, T., Otebolaku, A.M., Marchang, J., & Joy, D. (2020). Continuous m-Health Data Authentication Using Wavelet Decomposition for Feature Extraction. Sensors, 20, 5690. http://doi.org/10.3390/s20195690

Enamamu, T., Otebolaku, A., Marchang, J., & Dany, J. (2020). Continuous m-Health Data Authentication Using Wavelet Decomposition for Feature Extraction. Sensors, 20 (19). http://doi.org/10.3390/s20195690

Ingham, M., Marchang, J., & Bhowmik, D. (2020). IoT Security Vulnerabilities and Predictive Signal Jamming Attack Analysis in LoRaWAN. IET Information Security. http://doi.org/10.1049/iet-ifs.2019.0447

Marchang, J., Wang, J., Otebolaku, A., Enamamu, T., Porter, D., & Sanders, B. (2019). Multidimensional: User with File Content and Server’s status based Authentication for Secure File Operations in Cloud. Current Trends in Computer Sciences & Applications (CTCSA), 1 (5), 108-118. http://doi.org/10.32474/CTCSA.2019.01.000121

Marchang, J., Douglas, R., Ghita, B., Lancaster, D., & Sanders, B. (2018). Dynamic neighbour aware power-controlled MAC for multi-hop ad hoc networks. Ad hoc Networks, 75-76, 119-134. http://doi.org/10.1016/j.adhoc.2018.04.003

Marchang, J., Ghita, B., & Lancaster, D. (2017). Location based transmission using a neighbour aware with optimized EIFS MAC for ad hoc networks. Ad Hoc Networks, 63, 62-78. http://doi.org/10.1016/j.adhoc.2017.06.001

Marchang, J., Ghita, B., & Lancaster, D. (2015). Dynamic queue utilization based MAC for multi-hop ad hoc networks. Infocommunications Journal, 7 (3), 25-32. http://www.infocommunications.hu/documents/169298/1598142/InfocomJ_2015_3_5_Marchang.pdf

Conference papers

Reji, A., Pranggono, B., Marchang, J., & Shenfield, A. (2023). Anomaly detection for the internet-of-medical-things. In IEEE International Conference on Communications - 5th International Workshop on IoT Enabling Technologies in Healthcare (IoT-Health 2023), Rome, Italy, 28 May 2023 - 1 June 2023 (pp. 1944-1949). IEEE: http://doi.org/10.1109/ICCWorkshops57953.2023.10283523

Zoughalian, K., Marchang, J., & Di Nuovo, A. (2023). Access control mechanism framework for assistive robots in healthcare. In TAROS’23 & Joint Robotics CDTs Conference, Department of Engineering Cambridge University, 13 September 2023 - 15 September 2023 (pp. 76-79). https://tarosconferenceorg.files.wordpress.com/2023/09/taros2023_all_abstracts.pdf

Marchang, J., Ibbotson, G., & Wheway, P. (2019). Will Blockchain technology become a reality insensor networks? 2019 Wireless Days (WD). http://doi.org/10.1109/WD.2019.8734268

Marchang, J., Beavers, J., & Faulks, M. (2019). Hacking NHS Pacemakers: A Feasibility Study. 12th International Conference on Global Security, Safety & Sustainability. http://london.northumbria.ac.uk/event/icgs3-19/

Marchang, J., Sanders, B., & Joy, D. (2018). Adaptive V2V routing with RSUs and gateway support to enhance network performance in VANET. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10866, 298-310. http://doi.org/10.1007/978-3-030-02931-9_24

Sanders, B., & Marchang, J. (2016). A novel taxonomy of opportunities and risks in massively multiplayer online role playing games. In Proceedings of the International ACM conference on management of Digital Ecosystems, (pp. 90-98). ACM Digital Library: http://doi.org/10.1145/3012071.3012094

Marchang, J., Ghita, B., & Lancaster, D. (2016). Location based transmission using a neighbour aware-cross layer MAC for ad hoc networks. In Mamatas, L., Matta, I., Papadimitriou, P., & Yevgeni, K. (Eds.) WWIC 2016: Wired/Wireless Internet Communications, (pp. 15-27). Cham: Springer: http://doi.org/10.1007/978-3-319-33936-8_2

Marchang, J., Ghita, B., & Lancaster, D. (2015). Queue utilization with hop based enhanced arbitrary inter frame spacing MAC for saturated ad HOC networks. Proceedings of the 2015 14th Annual Mediterranean Ad Hoc Networking Workshop, MED-HOC-NET 2015, 1-8. http://doi.org/10.1109/MedHocNet.2015.7173170

Marchang, J., Ghita, B., & Lancaster, D. (2015). Dynamic Queue Utilization Based MAC for multi-hop Ad Hoc networks. Infocommunications Journal, 3 (3), 25-32. https://ieeexplore.ieee.org/document/7147719

Marchang, J., Ghita, B., & Lancaster, D. (2014). Hop-Based dynamic fair scheduler for wireless Ad-Hoc networks. 2013 IEEE International Conference on Advanced Networks and Telecommunications Systems, ANTS 2013, 1-6. http://doi.org/10.1109/ANTS.2013.6802873

Kothari, S., Parmar, H., Das, E., Panda, N., Ahmed, A., & Marchang, J. (2011). HOST BASED INTRUSION DETECTION SYSTEM. 2011 INTERNATIONAL CONFERENCE ON MECHANICAL ENGINEERING AND TECHNOLOGY (ICMET 2011), 875-878.

Kothari, S., Parmar, H., Das, E., Panda, N., Ahmed, A., & Marchang, J. (2010). Host Based Intrusion Detection System. 2011 INTERNATIONAL CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND AUTOMATION (CCCA 2011), VOL III, 336-339.

Marchang, J., Nandi, S., & Sarma, N. (2010). Prioritized Quality of Service Support Medium Access Control for Real Time Flows. 2010 Second International Conference on Computer and Network Technology. http://doi.org/10.1109/iccnt.2010.69

Marchang, J., S, S., Kumar, C., Islam, A., & N, S. (2008). Multi-Path Routing for Real Time Traffic with QoS Support.

Jims, M., Sarma, N., & Nandi, S. (2007). Priority Based Fairness Provisioning QoS-Aware MAC Protocol. 15th International Conference on Advanced Computing and Communications (ADCOM 2007). http://doi.org/10.1109/adcom.2007.98

Zoughalian, K., Marchang, J., & Di Nuovo, A. (2024). Access Control Architecture of Assistive Robots for Physical Activity Wellbeing Data. In The 25th IEEE International Conference on Industrial Technology, Bristol, UK, 25 March 2024 - 27 March 2024.

Mawanda, R., Keishing, S., Wang, J., & Marchang, J. (2024). Secure by Design Smart Authentication for Care Robots to Support the Elderly. In ICIT 2024. The 25th IEEE International Conference on Industrial Technology), Bristol, UK, 25 March 2024 - 27 March 2024.

Book chapters

Marchang, J., & Douglas, R. (2019). Selecting tools for penetration testing. In Penetration Testing A Guide for Business and IT Management. BCS, The Chartered Institute for IT: https://shop.bcs.org/store/221/detail/workgroup?id=3-221-9781780174082

Marchang, J., & Douglas, R. (2019). Scoping a penetration test. In Penetration Testing A Guide for Business and IT Management. BCS, The Chartered Institute for IT

Marchang, J., & Nandi, S. (2011). Need for cross layer in wireless multi hop ad-hoc networks. In Advanced Computing Applications, Databases and Networks. Alpha Science International Limited

Marchang, J., & Sharma, N. (2007). QoS in MAC layer of MANET. In National Conference on Trends in Advanced Computing NCTAC 2007. Narosa publishing house, New Delhi

Marchang, J., & Sarma, N. (2007). National Conference on Trends in Advanced Computing NCTAC 2007. In QoS in MAC layer of MANET. Narosa publishing house, New Delhi, India

Books

Marchang, J. (2017). Optimising Application Performance in Ad Hoc Networks. Germany: Scholars' Press. https://www.scholars-press.com/catalog/details//store/gb/book/978-620-2-30210-4/optimising-application-performance-in-ad-hoc-networks

Reports

Marchang, J., Di Nuovo, A., Elliott, C., Meese, H., Vinanzi, S., & Zecca, M. (2023). Security and privacy in assistive robotics: cybersecurity challenges for healthcare. EPSRC UK-RAS Network. https://www.ukras.org.uk/publications/white-papers/security-and-privacy-in-assistive-robotics/

Other activities

As a researcher, he publishes research work in leading journals and conferences (IEEE, Elsevier, Springer, MDPI, HTE etc) in the fields of Ad Hoc and Sensor Networks, Autonomous Vehicles, IoT security, Blockchain and Information Security. He is a reviewer of ETRI Journal, IEEE Transactions on Vehicular Technology, IEEE TVT Journal, MDPI – Sensors, Elsevier, Journal of Information Security and Applications, International Journal of Electrical and Computer Engineering (IJECE) and other leading IEEE conferences. He is also a technical member of various conferences including INC, CIIT, ICACNI etc.

 

Postgraduate supervision

  • Mr. Kavian Zoughalian, Topic: Privacy and security mechanisms for multimodal assistive robotic system, as Director of Studies (Start Date: 2022).
  • Mr. Popoola J. olusogo, Topic: Internet of Things (IoT) Security and Ethics pertaining to Smart Home Wellbeing Monitoring, as 2nd Supervisor (Start Date: 2021)
  • Mrs.  Eniola Sharon, Topic: Heart Rate Variability for Authentication and Wellbeing Assessment in Support of Healthy Ageing, as 2nd Supervisor (Start Date: 2021).
  • Mrs. Nnenna Onwuneme, Topic: Transforming Food Supply Chain Management System Through Smart IoT and Blockchain Technology, as Director of Studies (Start Date: 2021)


External Ph.D. examination completed: 1 (University of Sheffield)
Virtual Ph.D. examination: 1 (SHU)
Internal Chair of Ph.D. Examination completed: 3 (SHU)

PS: If you are looking for a Ph.D. position with external funding arranged by your own or if you are self-funded, you are welcome to contact Dr. Marchang in the field of IoT & IoMT security and privacy, robotic security and privacy, building trusted and transparent systems including Blockchain technologies and intrusion detection. You can also come and work with us as a research placement student. 

 

Cancel event

Are you sure you want to cancel your place on Saturday 12 November?

}